Analysis
-
max time kernel
18s -
max time network
144s -
platform
android_x86 -
resource
android-x86-arm-20240611-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611-enlocale:en-usos:android-9-x86system -
submitted
11-06-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
9f2309e1ac62ada4dae6968cedc1b6b7_JaffaCakes118.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral2
Sample
9f2309e1ac62ada4dae6968cedc1b6b7_JaffaCakes118.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral3
Sample
MiGameCenterSDKService.apk
Resource
android-x86-arm-20240611-en
Behavioral task
behavioral4
Sample
MiGameCenterSDKService.apk
Resource
android-x64-20240611-en
Behavioral task
behavioral5
Sample
MiGameCenterSDKService.apk
Resource
android-x64-arm64-20240611-en
General
-
Target
9f2309e1ac62ada4dae6968cedc1b6b7_JaffaCakes118.apk
-
Size
18.0MB
-
MD5
9f2309e1ac62ada4dae6968cedc1b6b7
-
SHA1
78abf15dba2bc61fbbd6a657d0a9e14f91cf0b98
-
SHA256
85f65a894a077095a3fa894669b77637bc66c5a07ad3086c9bc61839e00ade36
-
SHA512
0dc73b44dadaf9e3287c7471ca6185f38f02526e9fef3ffc55bb3d3f60cc41f59fa45aed7ef655df730ab2cd3f6069f7a509e6315e49450dec4f694fe507291d
-
SSDEEP
393216:q6hHhi9u22GDfRuyrmrHd0axa6CdxcFBiMhy9REdE7IdHrfNqcla2x1rFC:RVyIG7NmygoLcfRhyoCgLfNqB2x1k
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about active data network 1 TTPs 1 IoCs
Processes:
cn.gloud.shafa10description ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo cn.gloud.shafa10 -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
cn.gloud.shafa10description ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo cn.gloud.shafa10 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
cn.gloud.shafa10description ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone cn.gloud.shafa10 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
cn.gloud.shafa10description ioc process Framework service call android.app.IActivityManager.registerReceiver cn.gloud.shafa10 -
Checks memory information 2 TTPs 1 IoCs
Processes:
cn.gloud.shafa10description ioc process File opened for read /proc/meminfo cn.gloud.shafa10
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD5b5a14cce30db5540ce54e578f7e69aca
SHA138cf04df12113dbf0e7fadef3c5f4de8f86848b9
SHA2562428e0cc499ec28d5b4a216f2a2ff2d3c6a867deb9b0cb6f74c36c061b66a2b3
SHA5129f0dbb1c1ebe5ea8f3ecfc8dc867db350be6085d3d32f5554128eb7b5ed6bb43a0923ef4739eb6c7529492b80b7153ca0a425fecf19a57a4357aa07e1b75ba91